Listing Thumbnail

    Level 3 - Palo Alto VM Series Enforcement

     Info
    In-depth traffic analysis to identify gaps in existing policies and provide evidence-based recommendations for enhancements. This is a customized, service-based implementation of traffic analysis for AWS, not a best practices review.
    Listing Thumbnail

    Level 3 - Palo Alto VM Series Enforcement

     Info

    Overview

    This service offers in-depth traffic analysis to identify gaps in existing policies and provide evidence-based recommendations to optimize the AWS security platform, avoiding generic best-practice approaches.

    It includes analysis of 10% of the security policies and associated profiles, evaluating key elements such as Content-ID, Anti-virus, Anti-spyware, vulnerability protection, URL filtering, file blocking, DNS sinkhole and Wildfire analysis.

    Security profile assessments, threat analysis and attack surface reduction are also performed. The service includes the installation of a reporting package, detailed reporting on threats and changes made, and up to four four-hour remote sessions for support and validation.

    • Analysis of 10% of the security policies and the security profiles associated with them.
    • Configuration of Content-ID elements include: Log forwarding, Anti-virus, Anti-spyware, Vulnerability protection, URL filtering, File blocking, DNS sinkhole, Wildfire Analysis.
    • Perform security gap analysis and attack surface reduction.
    • Installation of a network analysis reporting package.
    • Execution of traffic and threat analysis.
    • Evaluating security profiles.
    • Create a threat analysis report, and a detailed document with the changes made to the network.
    • Up to a maximum of four (4) remote sessions of maximum four (4) hours each.

    Highlights

    • Comprehensive security analysis: identification of gaps in existing policies, evaluation of security profiles, and reduction of the attack surface to optimize network protection.
    • Implementation of advanced tools: configuration and analysis of key elements such as Content-ID, Anti-virus, URL filtering, DNS sinkhole, and Wildfire Analysis, along with the installation of a custom reporting package.
    • Documentation and remote support: delivery of detailed reports on threat analysis and changes made, with up to four remote technical support sessions to ensure effective implementation.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Our Service Level Agreement (SLA) guarantees 24/7* support to ensure uninterrupted assistance for our clients. We commit to a first response time of under 15 minutes, providing prompt attention to your needs. Our SLA includes vendor support to address issues requiring external expertise, ensuring seamless problem resolution. Clients can reach us anytime through Xelco, telephone, email, or live chat, offering flexible communication options tailored to their preferences.

    Software associated with this service